• Get Help

    Please enter the 6-digit code provided by your support representative:


    You will be prompted by your browser to download the file Support-LogMeInRescue.exe.

    Your Security
    • Remote sessions are sometimes recorded for traceability and training purposes.

    • You are in full control of your computer at all times.

    • You always have overriding control of your mouse and keyboard, and you can end the screen-sharing session at any time.

    Use of EasylifeIT™ Support Connection

    EasylifeIT Remote Support is for use by established clients only

  • Call us on 0800 043 9186
    • Brightfield Business Hub Bakewell Road, Peterborough. PE2 6XU

      Sales or support

      0800 043 9186
      01733 715930

      This email address is being protected from spambots. You need JavaScript enabled to view it.
      This email address is being protected from spambots. You need JavaScript enabled to view it.

    • Suite 2, Level 1, London house, 68-72 London street, Norwich, NR2 1JT.

      Sales or support

      0800 043 9186
      01603 562996

      This email address is being protected from spambots. You need JavaScript enabled to view it.
      This email address is being protected from spambots. You need JavaScript enabled to view it.

    • 22 Orton Enterprise Centre Bakewell Road, Peterborough. PE2 6XU

      Sales or support

      0800 043 9186
      01733 715930

      This email address is being protected from spambots. You need JavaScript enabled to view it.
      This email address is being protected from spambots. You need JavaScript enabled to view it.

8 common cyber crimes that affect you!

James AllisonWe all know what bank robbers and burglars do.  Understanding their common tools and techniques helps us to design appropriate defence mechanisms.  Cyber crime is no different.  Recognising the different tricks of the trade empowers us to implement the cyber equivalent of locking the door or fitting an alarm.

How many of the following 8 common tactics employed by cyber criminals have you heard of?

Phishing

An attempt to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication, typically an e-mail.  Often, these e-mails will contain links to bogus websites or attachments which unleash viruses onto your systems if opened.

Phishing has some close and equally unsavoury relatives:

  • Smishing – using SMS (text messages) as the means to fool you into parting with valuable information or clicking on malicious content.
  • Twishing – using Twitter as the medium to defraud you.

Vishing

A form of Phishing, but using voice rather than written electronic communication.  Criminals use social engineering over the telephone to gain access to valuable personal data, for example pretending to be from your bank in order to trick you into transferring money.

Spearing / Whaling

These are derivatives of Phishing and Phishing’s relatives.  Using the angling analogy, Phishing tends to be the equivalent of trawling rather than line fishing.  The criminals cast a large net and see what turns up in the catch.  They target quantity over quality.

Spearing is a more focussed campaign, targeting specific individuals or organisations.  Whaling is so-named because it targets senior executives - a deliberate attempt to snare the big fish.  These tactics aim for reward through quality rather than quantity of victim.

Spoofing

The creation of e-mail messages with a forged sender address.  In many cases it is likely to be an innocent third party infected by malware that is sending the e-mail without the owner’s knowledge.

Spoofing can be used to enhance the effectiveness of Spear Phishing.  E-mails may appear to be from someone you know and trust.  As a target, you become more likely to click on a bogus link or open an apparently innocuous (but in reality, malicious) attachment.

Pharming

A cyber attack intended to direct users to a fake website.  Often starting by opening a link from a Phishing e-mail, you may be lulled into entering data such as credit card details into a web site which looks legitimate but is in fact an imitation of the real thing.

Sniffing

The process of intercepting and logging traffic over a digital network.  An example would be hackers sat in a coffee shop monitoring and capturing data passing over the public wireless network from people using their Smartphones.  Whenever possible, avoid the use of public wifi networks to limit your exposure.  

DDoS

Distributed Denial of Service – an attempt to make a machine, network or website unavailable to intended users.  Typically this is done by flooding a system with so much traffic that it becomes overloaded.

Ransomware

Ransomware is malware which cyber criminals use to deny you access to your systems.  They demand a payment in return for removing the malicious software.  A well known example is Cryptolocker which encrypts your files, making them unreadable.  Ransomware can find routes into your systems through techniques such as rogue attachments within Phishing e-mails.

Practical steps to protect yourself

There are two principal approaches to help defend your business:

  • Human defences
  • Technical defences

Human defences should start from the top.  Ensure your directors and board members are trained on the business risks of cyber security and that you have a strategy to improve and maintain your resilience.  In parallel, ensure all your staff also have regular training, including building it into your induction process.

Understanding and investing in your technical defences should form a key part of your cyber security strategy.  There are schemes to help businesses do this, including the government backed ‘Cyber Essentials’.  This helps organisations achieve a solid level of protection, which not only defends your company but can also be used to demonstrate your robustness to potential customers.

To find out how EasylifeIT™ Security can help you and your business, contact us today on 0800 043 9186 or email This email address is being protected from spambots. You need JavaScript enabled to view it.

 

James Allison

Strategic IT Consultant. EasylifeIT Norwich
James is an experienced and versatile business professional who has worked across multiple sectors. He provides complementary skills to executive teams, advising across a range of disciplines including IT strategy, business continuity planning and IT project management.

Print Email

How to contact EasylifeIT™

  • Contacting EasylifeIT™ is easy. Call us on 0800 043 9186 (+44 1733 715930) if you would like to speak to one of our team. Alternatively, email This email address is being protected from spambots. You need JavaScript enabled to view it. or complete our short enquiry form.

    Please note that you will be redirected to our secure SSL portal to submit your details and returned when finished

    Contact Form

Strategy and consultancy

Strategy and consultancy
EasylifeIT™ Director
ConceiveIT. A bewildering array of choices; unfathomable jargon. EasylifeIT™ will talk to you in plain English. We will help you make sense of your options and give you the confidence to make good decisions

Read more

Preparation and implementation

Preparation and implementation
EasylifeIT™ Project Manager
ImplementIT. Let us plan, manage and implement the project for you, taking the weight off your shoulders while bringing years of cumulative experience to ensure its success.

Read more

IT SITE MANAGER and support

IT SITE MANAGER and support
EasylifeIT™ Site Manager
ManageIT. Few things are so disruptive to your operations as when the IT misbehaves, and a poorly maintained and managed system is much more likely to go wrong. Delegate this responsibility to easylifeIT™

Read more

IT SECURITY and Cyberessentials

IT SECURITY and Cyberessentials
EasylifeIT™ Security
SecureIT. The use of internet and email has brought enormous benefits, but also considerable risk. Every day there are cyber-attacks against companies just like yours

Read more